{"id":4020,"date":"2016-12-13T08:30:41","date_gmt":"2016-12-13T08:30:41","guid":{"rendered":"https:\/\/itsc-tx.com\/?p=4020"},"modified":"2022-11-01T06:58:28","modified_gmt":"2022-11-01T06:58:28","slug":"endpoint-security-5-things-to-know","status":"publish","type":"post","link":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/","title":{"rendered":"Endpoint security: 5 things to know"},"content":{"rendered":"<h2>Endpoint security: 5 things to know<\/h2>\n<p>Network security offerings clearly haven&#8217;t fixed the endpoint security challenge. The problems come on multiple fronts, which calls for a blended solution.<br \/>\nHere\u2019s what you need to know.<\/p>\n<h3>1. Antivirus is not enough<\/h3>\n<p>There\u2019s no argument that antivirus just doesn\u2019t cut it anymore. There\u2019s nothing new here, but it looks like the market is finally ready to accept that a platform approach is needed. Everyone should be integrating next-generation endpoint security technologies.<\/p>\n<h3>2. Perimeter defenses aren\u2019t enough, either<\/h3>\n<p>Historically, security experts might have seen companies spending around half their security budgets on perimeter defenses. Considering where the threats are, that\u2019s a disproportionate investment in securing the perimeter at the expense of taking a more comprehensive approach.<\/p>\n<h3>3. There have never been more choices<\/h3>\n<p>The main options within the realm of endpoint security include:<\/p>\n<p>Endpoint protection platforms (EPP)<br \/>\nEndpoint detection and response (EDR)<br \/>\nThreat isolation<br \/>\nExploit technique mitigation<br \/>\nData loss prevention<br \/>\nData encryption<br \/>\nSandboxing<br \/>\nPatch management<br \/>\nDeception<br \/>\nIntrusion detection systems<br \/>\nIntrusion prevention systems<br \/>\nRemote application access<br \/>\nThreat intelligence<br \/>\nThreat forensics<br \/>\nUser behavior analytics<\/p>\n<h3>Endpoint protection platforms<\/h3>\n<p>Endpoint protection platforms (EPP) bundle several security functionalities into one offering, which might include (but isn\u2019t limited to):<\/p>\n<p>Firewall<br \/>\nAnti-virus<br \/>\nApplication security<br \/>\nIPS<br \/>\nAnti-spyware<br \/>\nEPP will also integrate with vulnerability, patch, and configuration management.<\/p>\n<h3>Endpoint detection and response<\/h3>\n<p>Endpoint detection and response (EDR) suppliers have products that will monitor endpoints to detect, contain, investigate, and remediate threats. The approach is a little fresh and worth exploring. You should be looking for capabilities for:<br \/>\nManaged hunting<br \/>\nReal-time agent scoring<br \/>\nCentralized data<br \/>\nReal-time search<br \/>\nIncident containment<br \/>\nEvent feeding into SIEM<br \/>\nBuilt-in sandboxing<\/p>\n<h3>4. Layers make you safer<\/h3>\n<p>The better you layer your approach, the safer you\u2019ll be. At a minimum, you need EPP and EDR. After that, it\u2019s a matter of choosing the layer that makes the most sense for the business and the way you work.<\/p>\n<p>Whatever you choose, you need to consider network security as part of your overall mix.<\/p>\n<h3>5. You might need help<\/h3>\n<p>It\u2019s a big world out there, and it\u2019s growing in complexity. It\u2019s worth working with a trusted adviser to navigate the options, especially when money is a consideration.<\/p>\n<p>For starters, suppliers are starting to combine approaches to EPP and EDR. It\u2019s not easy to see who is going to take the lead. It\u2019s also likely that companies will start buying each other to offer more integrated approaches.<\/p>\n<p>Unless you want to stay on top of all that movement yourself, you need to work with someone who is keeping their eye on the shifting landscape.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Endpoint security: 5 things to know Network security offerings clearly haven&#8217;t fixed the endpoint security challenge. The problems come on multiple fronts, which calls for a blended solution. Here\u2019s what you need to know. 1. Antivirus is not enough There\u2019s no argument that antivirus just doesn\u2019t cut it anymore. There\u2019s nothing new here, but it [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":17046,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[15,37,39,33,34],"tags":[],"class_list":["post-4020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all","category-frontpage-article","category-insider","category-small-medium-business-it-solutions","category-technical-consulting"],"translation":{"provider":"WPGlobus","version":"3.0.2","language":"es","enabled_languages":["en","es"],"languages":{"en":{"title":true,"content":true,"excerpt":false},"es":{"title":false,"content":false,"excerpt":false}}},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Endpoint security: 5 things to know - iTSC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Endpoint security: 5 things to know - iTSC\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/\" \/>\n<meta property=\"og:site_name\" content=\"iTSC\" \/>\n<meta property=\"article:published_time\" content=\"2016-12-13T08:30:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-11-01T06:58:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2016\/12\/endpoint-security-5-things-to-know-banner.png\" \/>\n\t<meta property=\"og:image:width\" content=\"795\" \/>\n\t<meta property=\"og:image:height\" content=\"313\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Michelle Richard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Michelle Richard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/\"},\"author\":{\"name\":\"Michelle Richard\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#\\\/schema\\\/person\\\/0d1ca0c3fd7ad647e87841063e2bf0cc\"},\"headline\":\"Endpoint security: 5 things to know\",\"datePublished\":\"2016-12-13T08:30:41+00:00\",\"dateModified\":\"2022-11-01T06:58:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/\"},\"wordCount\":445,\"image\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/endpoint-security-5-things-to-know-banner.png\",\"articleSection\":[\"All\",\"Frontpage Article\",\"Insider\",\"Small-Medium Business IT Solutions\",\"Technical Consulting\"],\"inLanguage\":\"es-ES\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/\",\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/\",\"name\":\"Endpoint security: 5 things to know - iTSC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/endpoint-security-5-things-to-know-banner.png\",\"datePublished\":\"2016-12-13T08:30:41+00:00\",\"dateModified\":\"2022-11-01T06:58:28+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#\\\/schema\\\/person\\\/0d1ca0c3fd7ad647e87841063e2bf0cc\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/#breadcrumb\"},\"inLanguage\":\"es-ES\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/endpoint-security-5-things-to-know-banner.png\",\"contentUrl\":\"https:\\\/\\\/www.itsc-tx.com\\\/wp-content\\\/uploads\\\/2016\\\/12\\\/endpoint-security-5-things-to-know-banner.png\",\"width\":795,\"height\":313},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/endpoint-security-5-things-to-know\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.itsc-tx.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Endpoint security: 5 things to know\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#website\",\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/\",\"name\":\"iTSC\",\"description\":\"IT Support #PeaceofMind\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.itsc-tx.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es-ES\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.itsc-tx.com\\\/#\\\/schema\\\/person\\\/0d1ca0c3fd7ad647e87841063e2bf0cc\",\"name\":\"Michelle Richard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es-ES\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g\",\"caption\":\"Michelle Richard\"},\"url\":\"https:\\\/\\\/www.itsc-tx.com\\\/es\\\/author\\\/mrichard\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Endpoint security: 5 things to know - iTSC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/","og_locale":"es_ES","og_type":"article","og_title":"Endpoint security: 5 things to know - iTSC","og_url":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/","og_site_name":"iTSC","article_published_time":"2016-12-13T08:30:41+00:00","article_modified_time":"2022-11-01T06:58:28+00:00","og_image":[{"width":795,"height":313,"url":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2016\/12\/endpoint-security-5-things-to-know-banner.png","type":"image\/png"}],"author":"Michelle Richard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Michelle Richard","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/#article","isPartOf":{"@id":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/"},"author":{"name":"Michelle Richard","@id":"https:\/\/www.itsc-tx.com\/#\/schema\/person\/0d1ca0c3fd7ad647e87841063e2bf0cc"},"headline":"Endpoint security: 5 things to know","datePublished":"2016-12-13T08:30:41+00:00","dateModified":"2022-11-01T06:58:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/"},"wordCount":445,"image":{"@id":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2016\/12\/endpoint-security-5-things-to-know-banner.png","articleSection":["All","Frontpage Article","Insider","Small-Medium Business IT Solutions","Technical Consulting"],"inLanguage":"es-ES"},{"@type":"WebPage","@id":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/","url":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/","name":"Endpoint security: 5 things to know - iTSC","isPartOf":{"@id":"https:\/\/www.itsc-tx.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/#primaryimage"},"image":{"@id":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/#primaryimage"},"thumbnailUrl":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2016\/12\/endpoint-security-5-things-to-know-banner.png","datePublished":"2016-12-13T08:30:41+00:00","dateModified":"2022-11-01T06:58:28+00:00","author":{"@id":"https:\/\/www.itsc-tx.com\/#\/schema\/person\/0d1ca0c3fd7ad647e87841063e2bf0cc"},"breadcrumb":{"@id":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/#breadcrumb"},"inLanguage":"es-ES","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/"]}]},{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/#primaryimage","url":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2016\/12\/endpoint-security-5-things-to-know-banner.png","contentUrl":"https:\/\/www.itsc-tx.com\/wp-content\/uploads\/2016\/12\/endpoint-security-5-things-to-know-banner.png","width":795,"height":313},{"@type":"BreadcrumbList","@id":"https:\/\/www.itsc-tx.com\/es\/endpoint-security-5-things-to-know\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.itsc-tx.com\/"},{"@type":"ListItem","position":2,"name":"Endpoint security: 5 things to know"}]},{"@type":"WebSite","@id":"https:\/\/www.itsc-tx.com\/#website","url":"https:\/\/www.itsc-tx.com\/","name":"iTSC","description":"IT Support #PeaceofMind","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.itsc-tx.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es-ES"},{"@type":"Person","@id":"https:\/\/www.itsc-tx.com\/#\/schema\/person\/0d1ca0c3fd7ad647e87841063e2bf0cc","name":"Michelle Richard","image":{"@type":"ImageObject","inLanguage":"es-ES","@id":"https:\/\/secure.gravatar.com\/avatar\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d237094d06ce57e3c956d84cbe157f3e10cf2e286b7cfb7c7936444ea01ad01f?s=96&d=mm&r=g","caption":"Michelle Richard"},"url":"https:\/\/www.itsc-tx.com\/es\/author\/mrichard\/"}]}},"_links":{"self":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts\/4020","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/comments?post=4020"}],"version-history":[{"count":2,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts\/4020\/revisions"}],"predecessor-version":[{"id":17047,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/posts\/4020\/revisions\/17047"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/media\/17046"}],"wp:attachment":[{"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/media?parent=4020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/categories?post=4020"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itsc-tx.com\/es\/wp-json\/wp\/v2\/tags?post=4020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}